Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices

被引:4
|
作者
Thapar, Sapna [1 ]
Mishra, Deepak [2 ]
Saini, Ravikant [1 ]
机构
[1] Indian Inst Technol Jammu, Dept Elect Engn, Jammu 181221, India
[2] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
关键词
Imperfect successive interference cancellation (SIC); joint optimization; nonorthogonal multiple access (NOMA); physical layer security; secrecy fairness; NONORTHOGONAL MULTIPLE-ACCESS; PHYSICAL LAYER SECURITY; POWER ALLOCATION; MIMO-NOMA; INTERNET; FAIRNESS; PRIVACY; SYSTEMS;
D O I
10.1109/TII.2023.3263276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a non orthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation, we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate that the conventional decoding order and assigning more power allocation to weak devices, as presumed in many NOMA works, is not an optimal strategy from the secrecy fairness viewpoint. Also, average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [41] Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices
    Hu, Qiao
    Zhang, Jingyi
    Hancke, Gerhard P.
    Hu, Yupeng
    Li, Wenjia
    Jiang, Hongbo
    Qin, Zheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1326 - 1338
  • [42] Cost-Efficient Edge Caching for NOMA-Enabled IoT Services
    Chen Ying
    Xing Hua
    Ma Zhuo
    Chen Xin
    Huang Jiwei
    China Communications, 2024, 21 (08) : 182 - 191
  • [43] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [44] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609
  • [45] Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices
    Nunes, Ivan De Oliveira
    Jakkamsetti, Sashidhar
    Rattanavipanon, Norrathep
    Tsudik, Gene
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (07) : 58 - 64
  • [46] Asymmetric Autoencoders: An NN alternative for resource-constrained devices in IoT networks
    Gilbert, Mateus S.
    de Campos, Marcello L. R.
    Campista, Miguel Elias M.
    AD HOC NETWORKS, 2024, 156
  • [47] Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices
    Sekizawa, Toshifusa
    Mikoshi, Taiju
    Nagura, Masataka
    Watanabe, Ryo
    Chen, Qian
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [48] AES-8: A Lightweight AES for Resource-Constrained IoT Devices
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    Kumar, Vinod
    Gupta, Sachin Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (03):
  • [49] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    IEEE ACCESS, 2017, 5 : 16393 - 16405
  • [50] A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices
    Suarez-Albela, Manuel
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    Castedo, Luis
    2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 246 - 251